12.
    发明专利
    未知

    公开(公告)号:DE60233918D1

    公开(公告)日:2009-11-19

    申请号:DE60233918

    申请日:2002-08-01

    Applicant: SAFENET INC

    Inventor: COUILLARD BRUNO

    Abstract: Disclosed are a system and a method for transferring with improved security root keys from a key provider system to a customer system via an information network that is other than secure. The key provider provides a secure module having a super-root key stored therein within the customer system. The super-root key is accessible internally to the module only by program code executable on a processor internal to the module, and only in response to a request from a corresponding module of the key provider system. The super-root key is only for use in decrypting encrypted root keys that are provided from the key provider system, which decrypted root keys are stored internally to the secure module.

    13.
    发明专利
    未知

    公开(公告)号:DE60222575T2

    公开(公告)日:2008-06-26

    申请号:DE60222575

    申请日:2002-08-08

    Applicant: SAFENET INC

    Abstract: A method for generating look-up tables for a high speed multi-bit Real-time Deterministic Finite state Automaton (hereinafter RDFA). The method begins with a DFA generated in accordance with the prior art. For each state in the DFA, and for each of the bytes recognized in parallel the following occurs. First an n-closure list is generated. An n-closure list is a list of states reachable in n-transitions from the current state. Next an alphabet transition list is generated for each state. An "alphabet transition list" is a list of the transitions out of a particular state for each of the characters in an alphabet. Finally, the transitions are grouped into classes. That is, the transitions that go to the same state are grouped into the same class. Each class is used to identify the next state. The result is a state machine that has less states than the original DFA.

    14.
    发明专利
    未知

    公开(公告)号:DE60222575D1

    公开(公告)日:2007-10-31

    申请号:DE60222575

    申请日:2002-08-08

    Applicant: SAFENET INC

    Abstract: A method for generating look-up tables for a high speed multi-bit Real-time Deterministic Finite state Automaton (hereinafter RDFA). The method begins with a DFA generated in accordance with the prior art. For each state in the DFA, and for each of the bytes recognized in parallel the following occurs. First an n-closure list is generated. An n-closure list is a list of states reachable in n-transitions from the current state. Next an alphabet transition list is generated for each state. An "alphabet transition list" is a list of the transitions out of a particular state for each of the characters in an alphabet. Finally, the transitions are grouped into classes. That is, the transitions that go to the same state are grouped into the same class. Each class is used to identify the next state. The result is a state machine that has less states than the original DFA.

    16.
    发明专利
    未知

    公开(公告)号:AT373846T

    公开(公告)日:2007-10-15

    申请号:AT02798084

    申请日:2002-08-08

    Applicant: SAFENET INC

    Abstract: A method for generating look-up tables for a high speed multi-bit Real-time Deterministic Finite state Automaton (hereinafter RDFA). The method begins with a DFA generated in accordance with the prior art. For each state in the DFA, and for each of the bytes recognized in parallel the following occurs. First an n-closure list is generated. An n-closure list is a list of states reachable in n-transitions from the current state. Next an alphabet transition list is generated for each state. An "alphabet transition list" is a list of the transitions out of a particular state for each of the characters in an alphabet. Finally, the transitions are grouped into classes. That is, the transitions that go to the same state are grouped into the same class. Each class is used to identify the next state. The result is a state machine that has less states than the original DFA.

    Pocket encrypting and authenticating communications device

    公开(公告)号:AU4147097A

    公开(公告)日:1998-03-06

    申请号:AU4147097

    申请日:1997-08-12

    Applicant: SAFENET INC

    Abstract: A portable security device is disclosed which can be carried by an individual and connected directly to telephone circuits to both authenticate that individual and encrypt data communications. The invention can operate as an electronic "token" to uniquely identify the user to a network, to a computer system or to an application program. The "token" contains the complete network interface, such as a modem, which modulates the data and provides the circuitry required for direct connection to the network. Furthermore, this "token" will preferably not permit communications to proceed until the device, and optionally the user, have been identified by the proper authentication. The token also contains all of the cryptographic processing required to protect the data using data encryption or message authentication or digital signatures or any combination thereof. Thus, the present invention provides the user with all of the communications and security equipment needed for use with personal computers and electronic notebooks and eliminates the need for any other security measures and/or devices.

    BINDING A PROTECTED APPLICATION PROGRAM TO SHELL CODE
    19.
    发明申请
    BINDING A PROTECTED APPLICATION PROGRAM TO SHELL CODE 审中-公开
    绑定保护的应用程序到代码

    公开(公告)号:WO2007087316A2

    公开(公告)日:2007-08-02

    申请号:PCT/US2007/001800

    申请日:2007-01-23

    Inventor: ELTETO, Laszlo

    CPC classification number: G06F21/125

    Abstract: A system and method for binding a protected application to a shell module. The shell module is appended to the application. The shell module executes prior to the execution of the application, and first creates a resource. After the shell module finishes execution, the application tries to access the created resource. If the access is successful, the application is allowed to proceed. Otherwise, the application terminates. The inability of the application to access the resource is an indication that the shell module never actually created the resource. This suggests that the shell module never executed; the shell module may have been either removed or functionally disconnected from the application. This further implies that the security functionality of the shell module has not executed. The application is therefore not permitted to execute, since the shell's security checks have probably not been performed.

    Abstract translation: 将受保护的应用程序绑定到shell模块的系统和方法。 shell模块附加到应用程序。 shell模块在执行应用程序之前执行,并首先创建一个资源。 shell模块完成执行后,应用程序将尝试访问创建的资源。 如果访问成功,则允许应用程序继续。 否则,应用程序终止。 应用程序无法访问资源表明shell模块从未实际创建资源。 这表明shell模块从未执行过; 壳模块可能已被删除或与应用程序功能断开连接。 这进一步意味着shell模块的安全功能尚未执行。 因此,应用程序不允许执行,因为shell的安全检查可能未被执行。

    Method for handling data in a secure container

    公开(公告)号:US11102014B2

    公开(公告)日:2021-08-24

    申请号:US16262261

    申请日:2019-01-30

    Applicant: Safenet Inc.

    Abstract: The invention is a method for handling data in a secure container comprising first and second private keys uniquely allocated to the secure container. The secure container is configured to use the first private key to handle said data in a first operating mode and to use the second private key to handle said data in a second operating mode. The secure container is configured to prevent the update of the first private key after its clearing. The method comprises the step of automatically clearing the first private key in response to a request for enabling a software module in the second operating mode and a step of automatically using the first operating mode by the secure container if the first private key has not been cleared and of automatically using the second operating mode by the secure container if the first private key has been cleared.

Patent Agency Ranking